Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] ssd's in linux



Kent Borg wrote:
> I don't think that passes DoD requirements either.

The drill press? It certainly does for non-classified media. Classified 
media requires a thorough degaussing optionally followed by physical 
destruction. Incineration is also an option for classified media.

Incineration is also acceptable for flash media.

Repeat statement about how flash-based media are consumables.

> But I don't need to make the DoD happy, I just need to destroy the
> encryption key.

And all I -- for some value of "I" which may not be myself -- have to do 
is find a way to recover that key which, depending on [insert everything 
about potential weaknesses in algorithms and schedulers and 
not-really-random number generators here] may not be that difficult. 
Depends on your threat model.

Or you could use RAM-based SSDs instead of flash. Almost instant 
sanitizing when power is removed.

-- 
Rich P.



BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org